نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

1999
Dimitrios Hatzinakos

In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We speci cally address the problem of fragile digital watermarking for the tamper-proo ng of still images. Applications of our problem include authentication for courtroom evidence, insurance claims and journalistic photography. We present a novel fragile watermarking approach which embeds a ...

1997
Eli Biham Adi Shamir

In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES) . In this pa...

2007
Haibo Chen Fengzhe Zhang Cheng Chen Ziye Yang Rong Chen Binyu Zang Wenbo Mao

Software applications today face constant threat of tampering because of the vulnerability in operating systems and their permissive interface. Unfortunately, existing tamper-resistance approaches often require non-trivial amount of changes to core CPU architectures, operating systems and/or applications. In this paper, we propose an approach that requires only minimal changes to existing commo...

Journal: :Signal Processing 2003
Frédéric Deguillaume Sviatoslav Voloshynovskiy Thierry Pun

Digital watermarking appears today as an e.cient mean of securing multimedia documents. Several application scenarios in the security of digital watermarking have been pointed out, each of them with di/erent requirements. The three main identi1ed scenarios are: copyright protection, i.e. protecting ownership and usage rights; tamper proo1ng, aiming at detecting malicious modi1cations; and authe...

Journal: :Sci. Ann. Comp. Sci. 2013
Ioana Boureanu Serge Vaudenay

Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. These commitments are weak in that it is legitimate that a party could cheat. Unlike in several similar lines of work, in our case, the party is not obliged to cheat, but he has ability to cheat if and when needed. The empowered party is the sende...

Journal: :I. J. Network Security 2018
Ahmed A. Elngar

Security of networks is the most important challenge of the Internet of Things (IoT) that need smarter security mechanisms. Therefore, a tamper detection (TD) is an efficient security mechanism based on networks of IoT for healthcare applications, which used to deal with security violations. In this paper, a new TD mechanism based IoT for real data of healthcare application called (IOTTD) model...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده کشاورزی 1392

در این مطالعه ژنومی متشکل از 10 کروموزوم هر یک به طول 200 سانتی¬مورگان شبیه¬سازی شد. نشانگرها بر روی ژنوم با فواصل 2/0 سانتی¬مورگان طراحی شدند و جایگاه‏های ژنی مؤثر بر صفات بر روی ژنوم با توزیع تصادفی و تعداد متغیر شبیه¬سازی شدند و تنها اثرات افزایشی ژنها در نظر گرفته ¬شد. در ابتدا جمعیت پایه¬ای از حیوانات با اندازه مؤثر 100 (50 نر و 50 ماده) شبیه¬سازی شد و این ساختار جمعیتی برای 50 نسل با آمیز...

2003
G. Edward Suh Dwaine Clarke Blaise Gassend Marten van Dijk Srinivas Devadas

We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...

Journal: :International Journal of Computer Applications 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید